NSL-KDD Dataset
☆206Jul 30, 2015Updated 10 years ago
Alternatives and similar repositories for NSL_KDD
Users that are interested in NSL_KDD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NSLKDD Dataset for WEKA☆36Mar 2, 2018Updated 8 years ago
- PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html☆130Sep 8, 2020Updated 5 years ago
- Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15☆765May 8, 2019Updated 6 years ago
- Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999☆21Nov 3, 2019Updated 6 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆272Apr 5, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Feature coded UNSW_NB15 intrusion detection data.☆89Jan 24, 2018Updated 8 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- Using NSL_KDD data☆28Mar 3, 2019Updated 7 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 7 years ago
- [Finished] My Bachelor thesis for the Bachelor Computer Science (2015-2016) at UHasselt: An Intrusion detection system using machine lear…☆41Sep 4, 2016Updated 9 years ago
- A Pytorch implementation of a proof-of-concept Intrusion Detection and Prevention system☆11Oct 1, 2019Updated 6 years ago
- A machine learning program, that detects denial of service attack using machine learning technique.☆25Sep 20, 2019Updated 6 years ago
- ☆19Dec 11, 2019Updated 6 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆296Dec 22, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- This repository includes code for the paper "Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion D…☆34Nov 8, 2024Updated last year
- ☆21Sep 21, 2020Updated 5 years ago
- 本笔记是对课程CS 259D中涉及的论文和讲义的扩展,建议阅读原始论文和讲义。☆72May 4, 2018Updated 7 years ago
- Basic Machine learning projects and assignments done by me.☆33Aug 12, 2020Updated 5 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- A Pytorch implementation of the paper `Deep Autoencoding Gaussian Mixture Model For Unsupervised Anomaly Detection` by Zong et al.☆69May 12, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆58May 15, 2019Updated 6 years ago
- converting malware .bytes file to image☆10Apr 19, 2019Updated 6 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 7 years ago
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has …☆682Dec 4, 2023Updated 2 years ago
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- ☆21May 19, 2016Updated 9 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Feb 5, 2024Updated 2 years ago
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- Ryu component-based software defined networking framework☆31Sep 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Machine Learning Based - Intrusion Detection System☆33Jun 21, 2022Updated 3 years ago
- Short Course - Applied Machine Learning for Security Informatics☆56Aug 26, 2016Updated 9 years ago
- Pre-processing NSL-KDD dataset using Data mining techniques. Algorithm written in python to detect the attacks in NSL KDD dataset.☆27Jan 6, 2020Updated 6 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆23Jan 9, 2017Updated 9 years ago